Safeguard identity on social media platforms
From reconnecting with an old friend from school, to hearing about a friend’s job promotion or viewing photos of a colleague’s new baby – social media has made it easy for consumers to share exciting news - or just let their social media circles of friends know where...
Bytes, Lumidigm partner on fingerprint ID
Bytes Technology Group has become a Lumidigm partner, following its acquisition of Brand New Technology (BNT), which had a broad range of exclusive distribution agreements in place focussed on delivering identification management solutions. The acquisition has seen...
Gemalto wins LTE award
Gemalto, the world leader in digital security, has won the Best LTE Security Product Award at the LTE World Summit 2013. The award recognises the best-in-classecurity delivered by Gemalto’s Advanced Connectivity solution, which combines the LinqUs Advanced OTA...
IndigoCube, Security Innovations partner
Hacking is becoming a major problem, both locally and internationally, and becoming increasingly clear that the methods used to date to deter hackers are woefully ineffective. New approaches to security need to be adopted if companies and governments hope to keep...
Firewalls keep cybercriminals out
In March this year, Internet users across the world experienced slowed down service due to what has been called the biggest cyber attack in history. Although the attack was specifically aimed at European spam fighting group The Spamhaus Project, Web sites around the...
Norton 360 offers multi-platform protection
Norton by Symantec has announced the availability of Norton 360 Multi-Device, a comprehensive security solution that provides security across platforms and devices. For consumers who have multiple devices and want a simple, easy-to-use security solution, Norton 360...
Are biometrics solutions really secure?
Biometric access control technology has experienced phenomenal growth in adoption in South Africa over the past few years, with an estimated 80% of all access control solutions using fingerprint readers and other biometrics to enhance security, says Kobus Le Roux,...
Cloud security key for company data
There’s been a proliferation of cloud service providers on the local scene and this has granted companies the privilege of greater choice around who to entrust their data. The right to choose is one that Richard Broeke from specialist managed IT security services...
Panda delivers security for mining industry
Minopex, a leading exponent in outsourced operation and maintenance of minerals and metals processing plants, recently installed Panda Cloud Systems Management (PCSM) as its IT management solution of choice. Prior to the adoption of PCSM, the company’s IT management...
How to choose a remote monitoring service
When Dr Rudolph Zinn of the School of Criminal Justice recently did intensive research on the nature of robberies and attacks, he revealed some interesting findings: one being that alarms and armed reaction services are not a deterrent for robbers any longer, says...
How to choose a remote monitoring service
When Dr Rudolph Zinn of the School of Criminal Justice recently did intensive research on the nature of robberies and attacks, he revealed some interesting findings: one being that alarms and armed reaction services are not a deterrent for robbers any longer, says...
Managing mobile security in South Africa
From smartphones to tablets, mobile devices continue to cause ongoing concern for IT teams responsible for information security. Sensitive corporate information can be easily transported, leaked, or lost while the BYOD movement has dramatically increased the number of...